Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
01-System and Privacy Data Protection - Introduction.en.srt |
1.37Кб |
01-System and Privacy Data Protection - Introduction.mp4 |
40.10Мб |
02-Learning objectives.en.srt |
492б |
02-Learning objectives.mp4 |
16.48Мб |
03-1.1 Privacy vs. Security.en.srt |
8.96Кб |
03-1.1 Privacy vs. Security.mp4 |
155.32Мб |
04-1.2 Non-technical Controls.en.srt |
9.11Кб |
04-1.2 Non-technical Controls.mp4 |
120.71Мб |
05-1.3 Classification, Ownership, Retention, and Data Types.en.srt |
18.59Кб |
05-1.3 Classification, Ownership, Retention, and Data Types.mp4 |
233.87Мб |
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.en.srt |
12.84Кб |
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4 |
199.40Мб |
07-1.5 Data Minimization, Purpose Limitation, and NDA.en.srt |
2.33Кб |
07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4 |
30.70Мб |
08-1.6 Technical Controls.en.srt |
1.79Кб |
08-1.6 Technical Controls.mp4 |
21.06Мб |
09-1.7 Encryption.en.srt |
8.00Кб |
09-1.7 Encryption.mp4 |
114.80Мб |
10-1.8 Data Loss Prevention (DLP).en.srt |
1.70Кб |
10-1.8 Data Loss Prevention (DLP).mp4 |
10.32Мб |
11-1.9 Data Masking and Deidentification.en.srt |
4.96Кб |
11-1.9 Data Masking and Deidentification.mp4 |
69.44Мб |
12-1.10 Tokenization.en.srt |
2.03Кб |
12-1.10 Tokenization.mp4 |
24.58Мб |
13-1.11 Digital Rights Management (DRM) and Watermarking.en.srt |
5.79Кб |
13-1.11 Digital Rights Management (DRM) and Watermarking.mp4 |
61.66Мб |
14-1.12 Geographic Access Requirements.en.srt |
3.97Кб |
14-1.12 Geographic Access Requirements.mp4 |
52.03Мб |
15-1.13 Access Controls.en.srt |
1.84Кб |
15-1.13 Access Controls.mp4 |
21.14Мб |
16-Learning objectives.en.srt |
499б |
16-Learning objectives.mp4 |
18.03Мб |
17-2.1 Business Impact and Risk Calculation.en.srt |
1.72Кб |
17-2.1 Business Impact and Risk Calculation.mp4 |
23.90Мб |
18-2.2 Communication Risk Factors and Risk Prioritization.en.srt |
9.55Кб |
18-2.2 Communication Risk Factors and Risk Prioritization.mp4 |
120.55Мб |
19-2.3 System Assessments.en.srt |
6.56Кб |
19-2.3 System Assessments.mp4 |
68.74Мб |
20-2.4 Compensating Controls and Training - Part 1.en.srt |
19.93Кб |
20-2.4 Compensating Controls and Training - Part 1.mp4 |
207.90Мб |
21-2.5 Compensating Controls and Training - Part 2.en.srt |
13.94Кб |
21-2.5 Compensating Controls and Training - Part 2.mp4 |
151.52Мб |
22-2.6 Supply Chain Assessment.en.srt |
7.33Кб |
22-2.6 Supply Chain Assessment.mp4 |
60.91Мб |
23-Learning objectives.en.srt |
517б |
23-Learning objectives.mp4 |
17.95Мб |
24-3.1 Frameworks.en.srt |
3.85Кб |
24-3.1 Frameworks.mp4 |
46.08Мб |
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.en.srt |
16.95Кб |
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4 |
176.54Мб |
26-3.3 Control Types.en.srt |
16.92Кб |
26-3.3 Control Types.mp4 |
166.71Мб |
27-3.4 Audits and Assessments.en.srt |
10.59Кб |
27-3.4 Audits and Assessments.mp4 |
70.37Мб |
28-Learning objectives.en.srt |
422б |
28-Learning objectives.mp4 |
15.03Мб |
29-4.1 Event Logs.en.srt |
6.66Кб |
29-4.1 Event Logs.mp4 |
32.18Мб |
30-4.2 Syslogs.en.srt |
15.17Кб |
30-4.2 Syslogs.mp4 |
131.58Мб |
31-4.3 Firewall Logs.en.srt |
14.57Кб |
31-4.3 Firewall Logs.mp4 |
193.13Мб |
32-4.4 Web Application Firewall (WAF).en.srt |
11.17Кб |
32-4.4 Web Application Firewall (WAF).mp4 |
172.57Мб |
33-4.5 Proxy.en.srt |
22.57Кб |
33-4.5 Proxy.mp4 |
315.31Мб |
34-4.6 Intrusion Detection and Prevention (IDS_IPS).en.srt |
15.20Кб |
34-4.6 Intrusion Detection and Prevention (IDS_IPS).mp4 |
203.89Мб |
35-4.7 Impact Analysis.en.srt |
23.61Кб |
35-4.7 Impact Analysis.mp4 |
461.11Мб |
36-4.8 Organizations Impact vs. Localized Impact.en.srt |
2.93Кб |
36-4.8 Organizations Impact vs. Localized Impact.mp4 |
24.27Мб |
37-4.9 Immediate vs. Total.en.srt |
2.67Кб |
37-4.9 Immediate vs. Total.mp4 |
16.84Мб |
38-Learning objectives.en.srt |
451б |
38-Learning objectives.mp4 |
15.65Мб |
39-5.1 Security Information and Event Management (SIEM) - Part 1.en.srt |
11.92Кб |
39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4 |
133.31Мб |
40-5.2 Security Information and Event Management (SIEM) - Part 2.en.srt |
20.55Кб |
40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4 |
266.13Мб |
41-5.3 Rule Writing.en.srt |
6.27Кб |
41-5.3 Rule Writing.mp4 |
99.46Мб |
42-5.4 Known-bad Internet Protocol (IP).en.srt |
5.73Кб |
42-5.4 Known-bad Internet Protocol (IP).mp4 |
73.53Мб |
43-Learning objectives.en.srt |
607б |
43-Learning objectives.mp4 |
18.51Мб |
44-6.1 Malicious Payload.en.srt |
22.92Кб |
44-6.1 Malicious Payload.mp4 |
222.59Мб |
45-6.2 Domain Keys Identified Mail (DKIM).en.srt |
13.24Кб |
45-6.2 Domain Keys Identified Mail (DKIM).mp4 |
158.66Мб |
46-6.3 Domain-based Message.en.srt |
14.76Кб |
46-6.3 Domain-based Message.mp4 |
94.21Мб |
47-6.4 Embedded Links.en.srt |
5.86Кб |
47-6.4 Embedded Links.mp4 |
54.07Мб |
48-6.5 Impersonation.en.srt |
1.81Кб |
48-6.5 Impersonation.mp4 |
20.15Мб |
49-6.6 Header.en.srt |
3.39Кб |
49-6.6 Header.mp4 |
77.13Мб |
50-Learning objectives.en.srt |
606б |
50-Learning objectives.mp4 |
19.48Мб |
51-7.1 Workflow Orchestration.en.srt |
14.18Кб |
51-7.1 Workflow Orchestration.mp4 |
172.57Мб |
52-7.2 Security Orchestration.en.srt |
4.25Кб |
52-7.2 Security Orchestration.mp4 |
51.52Мб |
53-7.3 Security Orchestration, Automation, and Response (SOAR).en.srt |
6.42Кб |
53-7.3 Security Orchestration, Automation, and Response (SOAR).mp4 |
80.97Мб |
54-7.4 Scripting.en.srt |
5.23Кб |
54-7.4 Scripting.mp4 |
25.02Мб |
55-7.5 Application Programming Interface (API) Integration.en.srt |
6.39Кб |
55-7.5 Application Programming Interface (API) Integration.mp4 |
65.42Мб |
56-7.6 Automated Malware Signature Creation.en.srt |
2.89Кб |
56-7.6 Automated Malware Signature Creation.mp4 |
29.35Мб |
57-7.7 Data Encrichment.en.srt |
5.74Кб |
57-7.7 Data Encrichment.mp4 |
59.69Мб |
58-7.8 Threat Feed Combination.en.srt |
3.60Кб |
58-7.8 Threat Feed Combination.mp4 |
38.09Мб |
59-7.9 Machine Learning.en.srt |
21.93Кб |
59-7.9 Machine Learning.mp4 |
327.16Мб |
60-7.10 Security Content Automation Protocol (SCAP).en.srt |
2.91Кб |
60-7.10 Security Content Automation Protocol (SCAP).mp4 |
43.70Мб |
61-7.11 Continuous Integration.en.srt |
4.10Кб |
61-7.11 Continuous Integration.mp4 |
55.54Мб |
62-7.12 Continuous Deployment and Delivery.en.srt |
2.18Кб |
62-7.12 Continuous Deployment and Delivery.mp4 |
28.58Мб |
63-System and Privacy Data Protection - Summary.en.srt |
1.00Кб |
63-System and Privacy Data Protection - Summary.mp4 |
28.06Мб |
Bonus Resources.txt |
386б |
Get Bonus Downloads Here.url |
180б |